Analysis
-
max time kernel
137s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02/05/2022, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe
Resource
win10v2004-20220414-en
General
-
Target
0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe
-
Size
432KB
-
MD5
9fbcc7ee6dd506ce3fbe3fdf60a1a98a
-
SHA1
073849e1716fb74022c2465f9aa06e064c4ea63e
-
SHA256
0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116
-
SHA512
bbfb70dd42ddd5201bd6fd4871b42f311d99fcb93cb9b576407073ec8b1b8a46374b3b8d7cd527dfa94f4bfe6c91d7419392236bf9a9f0fbce13170e444e89d1
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1032-55-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1420 Fvsxjme.bat 1464 Fvsxjme.bat -
resource yara_rule behavioral1/files/0x000900000001273d-60.dat upx behavioral1/files/0x000900000001273d-61.dat upx behavioral1/files/0x000900000001273d-69.dat upx -
resource yara_rule behavioral1/memory/1032-55-0x0000000010000000-0x0000000010017000-memory.dmp vmprotect -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat 0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe File opened for modification C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat 0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1032 0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe 1420 Fvsxjme.bat 1464 Fvsxjme.bat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1032 0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1032 0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe 1420 Fvsxjme.bat 1464 Fvsxjme.bat -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1464 1420 Fvsxjme.bat 29 PID 1420 wrote to memory of 1464 1420 Fvsxjme.bat 29 PID 1420 wrote to memory of 1464 1420 Fvsxjme.bat 29 PID 1420 wrote to memory of 1464 1420 Fvsxjme.bat 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe"C:\Users\Admin\AppData\Local\Temp\0da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1032
-
C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat"C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat"C:\Program Files (x86)\Microsoft Fhdiwa\Fvsxjme.bat" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD59fbcc7ee6dd506ce3fbe3fdf60a1a98a
SHA1073849e1716fb74022c2465f9aa06e064c4ea63e
SHA2560da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116
SHA512bbfb70dd42ddd5201bd6fd4871b42f311d99fcb93cb9b576407073ec8b1b8a46374b3b8d7cd527dfa94f4bfe6c91d7419392236bf9a9f0fbce13170e444e89d1
-
Filesize
432KB
MD59fbcc7ee6dd506ce3fbe3fdf60a1a98a
SHA1073849e1716fb74022c2465f9aa06e064c4ea63e
SHA2560da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116
SHA512bbfb70dd42ddd5201bd6fd4871b42f311d99fcb93cb9b576407073ec8b1b8a46374b3b8d7cd527dfa94f4bfe6c91d7419392236bf9a9f0fbce13170e444e89d1
-
Filesize
432KB
MD59fbcc7ee6dd506ce3fbe3fdf60a1a98a
SHA1073849e1716fb74022c2465f9aa06e064c4ea63e
SHA2560da182d4a35ca4c180e55b48895b16abc1d94b1d464b726c5018d6ff847e3116
SHA512bbfb70dd42ddd5201bd6fd4871b42f311d99fcb93cb9b576407073ec8b1b8a46374b3b8d7cd527dfa94f4bfe6c91d7419392236bf9a9f0fbce13170e444e89d1